Beruflich Dokumente
Kultur Dokumente
ABSTRACT
Message authentication is one of the most effective ways to thwart unauthorized and corrupted
messages from being forwarded in wireless sensor networks (WSNs). For this reason, many
cryptosystems or public-key cryptosystems. Most of them, however, have the limitations of high
node compromise attacks. To address these issues, a polynomial-based scheme was recently
introduced. However, this scheme and its extensions all have the weakness of a built-in threshold
determined by the degree of the polynomial: when the number of messages transmitted is larger
than this threshold, the adversary can fully recover the polynomial.
In this paper, we propose a scalable authentication scheme based on elliptic curve cryptography
(ECC). While enabling intermediate nodes authentication, our proposed scheme allows any node
addition, our scheme can also provide message source privacy. Both theoretical analysis and
simulation results demonstrate that our proposed scheme is more efficient than the polynomial-
EXISTING SYSTEM:
The public-key based approach, each message is transmitted along with the digital
signature of the message generated using the sender’s private key. Every intermediate
forwarder and the final receiver can authenticate the message using the sender’s public
key. One of the limitations of the public-key based scheme is the high computational
overhead.
PROPOSED SYSTEM:
We propose an unconditionally secure and efficient SAMA. The main idea is that for
each message m to be released, the message sender, or the sending node, generates a
The generation is based on the MES scheme on elliptic curves. For a ring signature, each
ring member is required to compute a forgery signature for all other members in the AS.
In our scheme, the entire SAMA generation requires only three steps, which link all non-
senders and the message sender to the SAMA alike. In addition, our design enables the
signatures.
ADVANTAGES OF PROPOSED SYSTEM:
A novel and efficient SAMA based on ECC. While ensuring message sender privacy,
When applied to WSNs with fixed sink nodes, we also discussed possible techniques for
HARDWARE REQUIREMENT:
Hard Disk - 20 GB
Monitor - SVGA
SOFTWARE REQUIREMENTS: